نتایج جستجو برای: social infrastructures
تعداد نتایج: 623173 فیلتر نتایج به سال:
Data sharing over the internet is increasingly efficient and increasingly anonymous. This growing anonymity makes it difficult for data users to exchange feedback: interesting ideas, innovations, ancillary data, concerns about data quality, etcetera. For data producers not knowing the end-users makes it more difficult to collect end-user feedback and tailor the production process to users needs...
This paper takes a dynamic approach to understanding the nature and role of boundary objects by examining them in relation to the social infrastructures within which they are embedded and to the social identities of the groups that share them. It explores the premise that boundary objects are used not only as a translation device, but also as a resource to form and express social identities. It...
By bringing together science studies, information science and ethnographic fieldwork in interdisciplinary research the author argues for the relevance of ethnographic practices when studying information systems as infrastructures of communication. Ethnographic fieldwork focuses attention on fringes and materialities of infrastructures and renders the researcher able to read the invisible layers...
Interdependency among critical infrastructures contributes to vulnerabilities of those infrastructures. In this paper, the vulnerabilities of critical infrastructures are identified and analysed using social network analysis. In the analysis of network centrality, the importance of each critical infrastructure, in terms of its contribution to infrastructure interdependency, is ranked. The findi...
ly, the Pocket Switched Network can be thought of as a temporally evolving contact graph. Each contact corresponds to a momentary undirected edge and involves a two-way data exchange between the node pair involved. Edges appear and disappear according to some underlying stochastic process that corresponds to the social contacts. The key insight behind the concept of pocket switching is that by ...
The observed unbalance of spectrum utilization combined with the proliferation of wireless devices and the growth of online social networks call for a joint study of cognitive radios (CRs) and social networking towards improving the operation of both the underlying CR-capable communications infrastructures and of the corresponding dynamic networks. In this work, we address such issue and focus ...
We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing...
This paper takes a dynamic approach to understanding the nature and role of boundary objects by examining them in relation to the social infrastructures within which they are embedded and to the social identities of the groups that share them. We present a case study that describes the introduction of 3D modelling technologies into the AEC industry and the changes that consequently occurred. Ba...
Botnets have become a major threat in cyberspace. In order to effectively combat botnets, we need to understand a botnet’s Command-and-Control (C&C), which is challenging because C&C strategies and methods evolve rapidly. Very recently, botmasters have begun to exploit social network websites (e.g., Twitter.com) as their C&C infrastructures, which turns out to be quite stealthy because it is ha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید